Join over 2 million IT and cyber professionals advancing their careers

Video Transcription

00:04

now to protect ourselves against phoney e mails. We really need to apply the same information that we learned in social engineering because this is one of the main ways that social engineers trick us. And they persuade us to click on links and e mails that lead us to corrupt its sights that may insect

00:23

their systems

00:24

or they have open up attachments that contain mound were inside.

00:29

Um, ultimately, this is one of the easiest ways to distribute malware and to persuade someone to give out information that they really should not give up

00:39

phony emails. You know, often we hear about spam. We hear about female hoaxes. We hear about fishing.

00:46

Um, spam. Religious kind of overwhelms our in boxes in. The problem with that is, it can wind up causing a denial of service attack on our mail servers just because they're so inundated with these messages.

00:59

Um, and they really are a tremendous nuisance. Now. Hoaxes spread the email where I said misinformation. Anything from, you know, forthis email and Bill Gates will give you a dollar for $1000. Whatever,

01:12

um, to more serious requests. You know, if you provide us with their banking your banking information will send you a check. Immediate.

01:21

Um,

01:23

the biggest things that we can do to protect ourselves against compromise with e mails

01:29

stop clicking on leaks in email messages.

01:34

There is no good reason today

01:37

when you're in your email program to click on the link.

01:40

If they tell you you know you're, uh you're, uh, banking account has been compromised. Then go to the Earl Field interview bank's address and go through their weapons. Don't go from your mail to any sort of direct access. Okay, That's one of the most common tricks in the

02:00

look

02:00

that Attackers used for misdirection. They don't click on links and emails many times when you do that, or if you get infected with the virus from opening an attachment. What happens is your email address book is then used to board the virus or the mount where out to everybody in your address book

02:20

coming from you.

02:22

And the thing that's so sinister about that is now I get an email from somebody that I trust telling me to click on the link,

02:28

so we're still very vulnerable to that.

02:31

Stop clicking on links and e mails,

02:34

even If

02:35

they report to come from somebody you know or somebody you trust,

02:38

always check the email address. You know, a lot of times you'll see a message that says It's from Yahoo customer service, whatever. And then if you hover your mouths over, you'll see that the address is actually something totally different,

02:51

right? That's a very quick, easy way to verify that. This is, Ah, rogue email. This is something that's being spooked.

02:59

Um, don't download files that you haven't solicited.

03:02

You know, somebody sends you a spreadsheet or send you a document. Be very careful with it.

03:07

Check with the source. Make sure it's legitimate.

03:09

Check to see if it's digitally signed. Many organizations have a policy not to download or open attachments that are digitally signed.

03:19

Run your any virus software scan to make sure that the attachment isn't corrupted with malware.

03:25

Other things for mail that, you know, that should trigger your instinct that these air not legitimate. Look for poor spelling. Bad grammar. Um, anything that starts hitting you up for money, you can usually be pretty sure that that's Ah, that's a phishing E mail.

03:44

Very cautious with what you do in your email because you have the potential not just to effect your system, but to affect the other systems on your network

03:53

one more time. Stop clicking on land links in e mails. Don't do it.

Up Next

Intro to Infosec

Cybrary's introduction to information security is intended for everyone interested in a career in cybersecurity. Learn the basics, then launch your new career by continuing with our CompTIA A+, Network+, or Security+ Courses.